|
Contents |
7 |
|
|
Contributing Authors |
11 |
|
|
Preface |
19 |
|
|
I THEMES AND ISSUES |
22 |
|
|
Chapter 1 DEALING WITH TERABYTE DATA SETS IN DIGITAL INVESTIGATIONS |
23 |
|
|
Chapter 2 FORENSICS AND PRIVACY-ENHANCING TECHNOLOGIES |
37 |
|
|
Chapter 3 A NETWORK- BASED ARCHITECTURE FOR STORING DIGITAL EVIDENCE |
53 |
|
|
Chapter 4 DIGITAL FORENSICS: MEETING THE CHALLENGES OF SCIENTIFIC EVIDENCE |
63 |
|
|
II INVESTIGATIVE TECHNIQUES |
85 |
|
|
Chapter 6 DETECTING SOCIAL ENGINEERING |
87 |
|
|
Chapter 7 A FRAMEWORK FOR EMAIL INVESTIGATIONS |
99 |
|
|
Chapter 8 THE MITNICK CASE: HOW BAYES COULD HAVE HELPED |
111 |
|
|
Chapter 9 APPLYING FORENSIC PRINCIPLES TO COMPUTER-BASED ASSESSMENT |
125 |
|
|
Chapter 10 EXPLORING FORENSIC DATA WITH SELF-ORGANIZING MAPS |
133 |
|
|
III NETWORK FORENSICS |
145 |
|
|
Chapter 11 INTEGRATING DIGITAL FORENSICS IN NETWORK INFRASTRUCTURES |
147 |
|
|
Chapter 12 USING PEER-TO-PEER TECHNOLOGY FOR NETWORK FORENSICS |
161 |
|
|
Chapter 13 FORENSIC PROFILING SYSTEM |
173 |
|
|
Chapter 14 GLOBAL INTERNET ROUTING FORENSICS |
185 |
|
|
Chapter 15 USING SIGNALING INFORMATION IN TELECOM NETWORK FORENSICS |
197 |
|
|
IV PORTABLE ELECTRONIC DEVICE FORENSICS |
210 |
|
|
Chapter 16 FORENSIC ANALYSIS OF MOBILE PHONE INTERNAL MEMORY |
211 |
|
|
Chapter 17 IMAGING AND ANALYSIS OF GSM SIM CARDS |
225 |
|
|
Chapter 18 EXTRACTING CONCEALED DATA FROM BIOS CHIPS |
237 |
|
|
V LINUX AND FILE SYSTEM FORENSICS |
252 |
|
|
Chapter 19 RECOVERING DIGITAL EVIDENCE FROM LINUX SYSTEMS |
253 |
|
|
Chapter 20 DETECTING HIDDEN DATA IN EXT2/EXT3 FILE SYSTEMS |
265 |
|
|
VI APPLICATIONS AND TECHNIQUES |
278 |
|
|
Chapter 21 FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING |
279 |
|
|
Chapter 22 CONTENT- BASED IMAGE RETRIEVAL FOR DIGITAL FORENSICS |
291 |
|
|
Chapter 23 MAKING DECISIONS ABOUT LEGAL RESPONSES TO CYBER ATTACKS |
303 |
|
|
Chapter 24 APPLYING FILTER CLUSTERS TO REDUCE SEARCH STATE SPACE |
315 |
|
|
Chapter 25 IN- KERNEL CRYPTOGRAPHIC EXECUTABLE VERIFICATION |
323 |
|
|
More eBook at www.ciando.com |
0 |
|